Encryption at rest using external encryption keys
This documentation describes functionality that is not yet generally available.
The Bring Your Own Key (BYOK) feature is scheduled for release with a future 8.8 update. Details may change before the official feature release.
Learn how to configure encryption at rest for your Camunda 8 SaaS Orchestration cluster using Amazon KMS.
Prerequisites
Requirement | Description |
---|---|
Amazon account | Access to an Amazon account with KMS permissions. |
KMS permissions | Ability to create and manage KMS keys and attach policies. |
Cluster region | KMS key must reside in the same Amazon region as your Camunda 8.8 cluster. |
Technical familiarity | Some experience with Amazon console, IAM roles, and KMS is recommended. |
- Deleting or disabling your KMS key will make your cluster and data inaccessible.
- Key management is fully customer-side in Amazon KMS. Camunda cannot rotate keys.
Step 1: Create a Camunda 8 SaaS Orchestration cluster
- Sign in to the Camunda Console.
- Navigate to the Cluster section and click Create New Cluster.
- Select an Amazon region for your cluster.
- Choose Single region or Dual region backup.
- Dual region requires one key per region. Keys can be separate.
- Under Encryption at rest, choose External.
- Click Create cluster.
After creation, note the Amazon Role ARN displayed in the Console for your cluster.
Step 2: Create and configure an AWS KMS key
You can create the key either via CLI or manually in the AWS console.
Option A: Create the key using AWS CLI
We provide automated scripts to create the necessary KMS key(s) with the correct policy and permissions. Choose the option that matches your backup configuration.
Single-region backup
Use this script to create a single KMS key in the same region as the cluster.
What the script does:
- Creates a KMS key with the required policy for Camunda access.
- Sets up an alias for easier key management.
- Outputs the key ARN to provide to Camunda.
Instructions:
- Download create-byok-kms-key-single-region.sh.
- Modify the following values at the top of the script:
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
AWS_SESSION_TOKEN
(if using temporary credentials)YOUR_ACCOUNT_ID
ALIAS_NAME
(optional)
- Make the script executable and run it.
- Copy the outputted key ARN and provide it to Camunda.
Dual-region backup
Use this script to create a multi-region primary key in the cluster's region and a replica key in backup region.
What the script does:
- Creates a multi-region primary key and replica key.
- Applies the correct policies to both keys.
- Outputs both key ARNs to provide to Camunda.
Instructions:
- Download create-byok-kms-key-multi-region.sh.
- Modify the same variables as above.
- Make the script executable and run it.
- Copy the two outputted key ARNs and provide them to Camunda.
For dual-region setups, you can also run the single-region script twice—once in the cluster's region and once in backup region. Make sure to modify the REGION
variable before creating the second key.
Option B: Manual key creation in AWS Console
Single-region backup
- Sign in to AWS Console
- Navigate to the KMS service and select the correct region.
- Create a customer managed key
- Click Create key.
- Choose Symmetric and Encrypt and decrypt usage.
- Add labels
- Add an alias (e.g.,
camunda-saas-byok
). - Add a description (e.g.,
KMS key for Camunda SaaS BYOK
).
- Add an alias (e.g.,
- Define key administrators
- Select IAM users/roles that will administer the key.
- Define key usage permissions
- Skip this step; permissions are configured in the next step.
- Edit key policy
- Switch to policy view and replace the existing policy with the provided key policy.
- Replace
<YOUR_AWS_ACCOUNT_ID>
and<TENANT_ROLE_ARN>
with your values.
- Finish and copy the ARN
- Click Finish and copy the key ARN to use in the Camunda Console.
Dual-region backup
You can either create a multi-region key and replica or create two single-region keys.
Method A: Multi-region key (recommended)
- Follow the single-region steps, selecting Multi-Region key under Advanced options.
- After creating the primary key in cluster's region, go to Regional replicas and click Create replica key.
- Select the region for the replica and confirm. The region should be the same as the backup region.
- Copy both key ARNs and provide them to Camunda.
Method B: Two single-region keys
- Create a key in the cluster's region using the single-region steps.
- Repeat the process in the backup region using a different alias (e.g.,
camunda-saas-byok-replica
). - Provide both key ARNs to Camunda.
Sample key policy
Replace <tenant-role-arn>
with the Amazon Role ARN from Step 1, and <customer-aws-account>
with your AWS account ID.
View sample key policy JSON
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Enable IAM user permissions",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::<customer-aws-account>:root"
},
"Action": "kms:*",
"Resource": "*"
},
{
"Sid": "Allow Camunda tenant IAM Role basic key access",
"Effect": "Allow",
"Principal": {
"AWS": "<tenant-role-arn>"
},
"Action": [
"kms:Encrypt",
"kms:Decrypt",
"kms:ReEncrypt*",
"kms:DescribeKey",
"kms:GenerateDataKey*"
],
"Resource": "*"
},
{
"Sid": "Allow Camunda tenant IAM Role to create grants for provisioning encrypted EBS volumes",
"Effect": "Allow",
"Principal": {
"AWS": "<tenant-role-arn>"
},
"Action": ["kms:CreateGrant", "kms:ListGrants", "kms:RevokeGrant"],
"Resource": "*"
}
]
}
- Don’t restrict the Camunda cluster Role from required KMS actions.
- Key rotation is managed in AWS KMS; Camunda cannot rotate keys.
- Revoking access immediately breaks the cluster.
Step 3: Associate the KMS key with your Camunda cluster
- Return to the Camunda Console and locate the KMS Key ARN input field.
- For dual region, two fields will be available—enter the correct key for each region.
- Paste your Amazon KMS Key ARN(s) from Step 2.
- Confirm and apply. Camunda provisions storage using your key for:
- Document handling storage
- Backup storage
- Orchestration cluster persistent disks
- Elasticsearch persistent disks
Once a key is applied, it cannot be edited or replaced. To change keys, you must create a new cluster.
Step 4: Verify encryption and logging
- In the Camunda Console, check the cluster details page to confirm the KMS Key ARN is applied correctly.
- In AWS, verify key usage:
- Navigate to Customer managed keys.
- Select your key and view Key policy and Key usage tabs.
- Review Recent activity to confirm operations (Encrypt, Decrypt, GenerateDataKey).
Monitor KMS usage
- CloudTrail logs all KMS operations.
- CloudWatch can trigger alarms for:
- Key deletion or disabling
- Unauthorized access attempts
- Policy or grant modifications
- Regularly review logs to detect unauthorized activity.
You are responsible for monitoring key usage and access logs within your AWS account. Use CloudTrail and CloudWatch to detect misconfigurations or unauthorized access.
Additional considerations
- Key rotation: Enable automatic rotation or rotate manually in AWS KMS.
- Cost: Using Amazon KMS keys incurs storage and management charges in your Amazon account. See the Camunda pricing model.
- Failure scenarios: Deleting keys or revoking permissions makes cluster data inaccessible. See troubleshooting steps.
For more information, see the Amazon KMS documentation.